A Lesson In Timing Attacks (or, Don't us...
No information avaiable
http://codahale.com/a-lesson-in-timing-attacks/
popularity:
security
cryptography
java
timing
programming
hacking
attack
crypto
statistics
python
|
bouncycastle.org
Home of open source libraries of the Legion of the Bouncy Castle and their Java cryptography and C# cryptography resources
similarity:
popularity:
java
security
cryptography
encryption
crypto
programming
api
opensource
library
development
|
Keyczar
Keyczar: An open source cryptographic toolkit ... Introducing Keyczar ... Keyczar was originally developed by members of the Google Security Team and is ...
similarity:
popularity:
security
python
cryptography
java
programming
opensource
google
software
library
tools
|
An Illustrated Guide to Cryptographic Hashes
Steve Friedl's Unixwiz.net Tech Tips. An Illustrated Guide to Cryptographic Hashes ... With the recent news of weaknesses in some common security algorithms ...
similarity:
popularity:
security
cryptography
crypto
hash
encryption
reference
programming
tutorial
algorithms
md5
|
An Overview of Cryptography
Defines cryptographic terms and concepts, offers crypto scheme comparison, ... key, for example, can be found at http://www.garykessler.net/kumquat_pubkey.html. ...
similarity:
popularity:
cryptography
security
reference
encryption
crypto
algorithms
tutorial
computing
computer
programming
|
Matasano Security LLC - Chargen - Enough With The Rainbow Tables: What You Need To Know About Secure Password Schemes
No information avaiable
similarity:
popularity:
security
cryptography
password
programming
hashing
crypto
passwords
web
hash
encryption
|
Mobilefish.com - A tutorial about Bouncy Castle Crypto. Cryptography basics. Includes examples.
No information avaiable
similarity:
popularity:
java
cryptography
crypto
security
bouncycastle
tutorial
j2me
programming
opensource
jce
|
Schneier.com
Renowned security technologist and author.
similarity:
popularity:
security
cryptography
blog
technology
privacy
crypto
encryption
blogs
people
schneier
|
Jasypt: Java simplified encryption - Main
IMPORTANT: It is strongly advised not to use version 1.4 of the Apache Commons ... This problem will not arise if you use the default version of this library ...
similarity:
popularity:
java
security
encryption
cryptography
opensource
library
hibernate
framework
spring
programming
|
Cryptography and Network Security, Fourth Edition
No information avaiable
similarity:
popularity:
cryptography
security
resources
books
reference
education
crypto
book
programming
network
|
Main Page - OWASP
Developing software tools and knowledge based documentation that helps people secure web applications and web services.
similarity:
popularity:
security
web
programming
opensource
development
hacking
internet
application
webdev
software
|